THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2021-47558

net: stmmac: Disable Tx queues when reconfiguring the interface

AssignerLinux
Reserved2024-05-24
Published2024-05-24
Updated2024-06-10

Description

In the Linux kernel, the following vulnerability has been resolved: net: stmmac: Disable Tx queues when reconfiguring the interface The Tx queues were not disabled in situations where the driver needed to stop the interface to apply a new configuration. This could result in a kernel panic when doing any of the 3 following actions: * reconfiguring the number of queues (ethtool -L) * reconfiguring the size of the ring buffers (ethtool -G) * installing/removing an XDP program (ip l set dev ethX xdp) Prevent the panic by making sure netif_tx_disable is called when stopping an interface. Without this patch, the following kernel panic can be observed when doing any of the actions above: Unable to handle kernel paging request at virtual address ffff80001238d040 [....] Call trace: dwmac4_set_addr+0x8/0x10 dev_hard_start_xmit+0xe4/0x1ac sch_direct_xmit+0xe8/0x39c __dev_queue_xmit+0x3ec/0xaf0 dev_queue_xmit+0x14/0x20 [...] [ end trace 0000000000000002 ]---

Product status

Default status
unaffected

0366f7e06a6b before a92f0eebb8dc
affected

0366f7e06a6b before b270bfe69736
affected

Default status
affected

5.10
affected

Any version before 5.10
unaffected

5.15.6
unaffected

5.16
unaffected

References

https://git.kernel.org/stable/c/a92f0eebb8dc008b9e8c51c6f7b8c93b27a29a43

https://git.kernel.org/stable/c/b270bfe697367776eca2e6759a71d700fb8d82a2

cve.org CVE-2021-47558

nvd.nist.gov CVE-2021-47558

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2021-47558
© Copyright 2024 THREATINT. Made in Cyprus with +